Advertisement
Guest User

openldap tls test

a guest
Jun 18th, 2013
223
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.07 KB | None | 0 0
  1. ldapsearch -x -b -H ldaps://sciencebox -D "cn=Manager,dc=wiw,dc=ru" -W -d 1 -ZZ
  2. ldap_create
  3. ldap_extended_operation_s
  4. ldap_extended_operation
  5. ldap_send_initial_request
  6. ldap_new_connection 1 1 0
  7. ldap_int_open_connection
  8. ldap_connect_to_host: TCP sciencebox:636
  9. ldap_new_socket: 3
  10. ldap_prepare_socket: 3
  11. ldap_connect_to_host: Trying 127.0.0.1:636
  12. ldap_pvt_connect: fd: 3 tm: -1 async: 0
  13. TLS: certdb config: configDir='/etc/openldap/cacerts' tokenDescription='ldap(0)' certPrefix='' keyPrefix='' flags=readOnly
  14. TLS: cannot open certdb '/etc/openldap/cacerts', error -8018:Unknown PKCS #11 error.
  15. TLS: skipping 'ca.srl' - filename does not have expected format (certificate hash with numeric suffix)
  16. TLS: skipping 'wiw.key' - filename does not have expected format (certificate hash with numeric suffix)
  17. TLS: skipping 'ca.key' - filename does not have expected format (certificate hash with numeric suffix)
  18. TLS: skipping 'wiw.csr' - filename does not have expected format (certificate hash with numeric suffix)
  19. TLS: skipping 'wiw.cert' - filename does not have expected format (certificate hash with numeric suffix)
  20. TLS: skipping 'ca.cert' - filename does not have expected format (certificate hash with numeric suffix)
  21. TLS: certificate [O=wiw,L=MSK,ST=MSK,C=RU] is not valid - error -8182:Peer's certificate has an invalid signature..
  22. TLS: certificate [O=wiw,L=MSK,ST=MSK,C=RU] is not valid - error -8172:Peer's certificate issuer has been marked as not trusted by the user..
  23. TLS certificate verification: subject: O=wiw,L=MSK,ST=MSK,C=RU, issuer: O=wiw,L=MSK,ST=MSK,C=RU, cipher: Camellia-256, security level: high, secret key bits: 256, total key bits: 256, cache hits: 0, cache misses: 0, cache not reusable: 0
  24. ldap_open_defconn: successful
  25. ldap_send_server_request
  26. ber_scanf fmt ({it) ber:
  27. ber_scanf fmt ({) ber:
  28. ber_flush2: 31 bytes to sd 3
  29. ldap_result ld 0xb800b0 msgid 1
  30. wait4msg ld 0xb800b0 msgid 1 (infinite timeout)
  31. wait4msg continue ld 0xb800b0 msgid 1 all 1
  32. ** ld 0xb800b0 Connections:
  33. * host: sciencebox port: 636 (default)
  34. refcnt: 2 status: Connected
  35. last used: Tue Jun 18 14:51:03 2013
  36.  
  37.  
  38. ** ld 0xb800b0 Outstanding Requests:
  39. * msgid 1, origid 1, status InProgress
  40. outstanding referrals 0, parent count 0
  41. ld 0xb800b0 request count 1 (abandoned 0)
  42. ** ld 0xb800b0 Response Queue:
  43. Empty
  44. ld 0xb800b0 response count 0
  45. ldap_chkResponseList ld 0xb800b0 msgid 1 all 1
  46. ldap_chkResponseList returns ld 0xb800b0 NULL
  47. ldap_int_select
  48. read1msg: ld 0xb800b0 msgid 1 all 1
  49. ber_get_next
  50. ber_get_next: tag 0x30 len 31 contents:
  51. read1msg: ld 0xb800b0 msgid 1 message type extended-result
  52. ber_scanf fmt ({eAA) ber:
  53. read1msg: ld 0xb800b0 0 new referrals
  54. read1msg: mark request completed, ld 0xb800b0 msgid 1
  55. request done: ld 0xb800b0 msgid 1
  56. res_errno: 1, res_error: <TLS already started>, res_matched: <>
  57. ldap_free_request (origid 1, msgid 1)
  58. ldap_parse_extended_result
  59. ber_scanf fmt ({eAA) ber:
  60. ldap_parse_result
  61. ber_scanf fmt ({iAA) ber:
  62. ber_scanf fmt (}) ber:
  63. ldap_msgfree
  64. ldap_err2string
  65. ldap_start_tls: Operations error (1)
  66. additional info: TLS already started
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement